Software introduction:
Trojan Bast is the original anti-hacker-Trojan killing tool of this website, which can kill 8 122 international trojans and 1053 password-stealing trojans, ensuring the killing of legendary password-stealing trojans, oicq parasitic trojans, glacier file-related trojans, password-unsealing trojans, miracle shooters and other game password-mailing trojans, with built-in Trojan firewall. Any hacker who tries to send a password email needs Iparmor confirmation, which can not only kill Trojans.
Trojan removal expert 2008 V0227
Software introduction:
Trojan Antivirus Expert 2008 is a professional anti-killing Trojan software, which is particularly effective for the current popular Trojan virus. It thoroughly kills tens of thousands of Trojan spyware such as QQ pilfer date trojan, online game pilfer date trojan, shock wave, grey pigeon, hacker backdoor, etc. It is an indispensable fortress for your computer. This software not only uses traditional virus database to kill Trojans, but also intelligently kills unknown variant Trojans, automatically monitors suspicious programs in memory, kills Trojans in memory hard disk in real time, and uses the second generation Trojan scanning kernel to quickly kill Trojans. The software itself also integrates IE repair, malicious website interception system file repair, hard disk scanning function, system process management and startup project management.
New improvements in the 2008 edition:
1. Optimize most kernel codes to improve execution efficiency.
2. Reduce CPU and memory occupancy.
3. More efficient Trojan killing and interception capabilities
4. Add whitelist function
5. Support the improvement of details such as encryption dog mode registration.
Skynet firewall V3.0.0. 10 14 personal edition.
Software introduction:
Skynet Firewall Personal Edition is a network security program used by personal computers. It guards the network according to the security rules set by the administrator, and provides powerful functions such as access control and information filtering to help you resist network intrusion and attacks and prevent information leakage. Skynet firewall divides the network into LAN and Internet, and can set different security schemes for information from different networks, which is suitable for users who surf the Internet in any way.
Rising antivirus firewall combination edition 2007 V 19.50.32 is completely free.
Software introduction:
Rising antivirus firewall combination edition includes: Rising antivirus software 2007 edition, Rising personal firewall 2007 edition and Rising Kaka. You don't need to enter the serial number and user ID, you can download it immediately and use it normally.
Rising Anti-virus Software 2007 applies the commercial "virtual machine" technology to the anti-virus engine, and combines technologies such as startup scanning and unknown virus killing to achieve a major breakthrough in the ability to kill malignant and stubborn viruses such as "multi-shell". The anti-virus is rapid and thorough, and the overall technology is at the international advanced level.
Rising Personal Firewall 2007 can protect users' computers from hackers. The software is embedded with "Trojan Wall" technology, which completely solves the problem of account number and password loss.
Rising Kaka is a well-known professional rogue software removal tool in China, with more than 30 million users, which can completely remove more than 400 kinds of rogue software and make the computer run faster and more stable.
Defendio) V4.26.0.940 | can completely and quickly kill Trojan software.
Software Description: Real-time protection, original iDetect technology to quickly and comprehensively kill more than 150000 Trojan horses/spies/worms/advertisements/malware, heuristic defense against unknown threats, including memory, registry, network and file scanning, including real-time protection of file systems, system processes, system memory and other systems, iDetect fast scanning technology, supporting NTFS data streams, Compression formats such as Zip/GZip/Tar/Rar/Cab/Jar/MSI, and self-extracting formats of executable files are compiled by CAB/ZIP/RAR and CHM (?
Features:
1. Real-time protection, active security!
2. Lightning scanning, original iDetect technology, quick kill!
3. Defend against the unknown, create original heuristic defense, and eliminate unknown threats!
4. Thoroughly kill 65,438+050,000 threats, including Trojans/spies/worms/advertisements/malware, etc. , iDetect fast scanning technology, supporting NTFS data stream, compressed files such as Zip/GZip/Tar/Rar/Cab/Jar/MSI, executable self-extracting Foxmail generated by CAB/ZIP/RAR, CHM (compilation help file).
5. Green and healthy, never bundled with any software/plug-ins, no need to install!
6. Intelligent update, the daily information base is updated at all times to ensure the safety of your computer!
Function:
◇ System scanning: selectively scan your system;
A) Memory scanning: scanning all processes in the current memory space;
B) Registry scanning: scanning sensitive areas of the registry;
C) System area scanning: scanning sensitive areas;
D) File system scanning: thoroughly scan the file system;
E) LAN scanning: scanning shared folders/network drives in the LAN;
◇ Real-time protection: real-time, active, accurate, fast and extremely low system resource occupation to monitor the following four objects!
A) File system protection: By monitoring the read and write of the hard disk in real time, the file system can be protected in real time, actively, accurately, quickly and with extremely low system resource occupation!
b)。 Registry protection:
a)。 Automatic protection: automatic protection most threats will follow the behavior of automatic startup of Windows;
b)。 Protect IE browser: automatically protect IE browser from threats and malicious tampering;
C) Network protection: real-time detection of network connection;
D) Process protection: detect the process in real time and automatically guard against threats;
e)。 Memory protection: by monitoring the changes of the clipboard in real time, your memory system can be protected in real time, actively, accurately and quickly with very low system resource occupation!
f)。 System protection:
A) Protect removable media (USB flash drive /CD): When the USB flash drive /CD is inserted, it will automatically resist the threat of automatic operation;
B) Protect Windows services/drivers: When new Windows services/drivers are added, such threats will be automatically protected;
g)。 Heuristic defense: original heuristic defense, defense against unknown threats!
◇ Shortcut: Common scanning objects are combined, and these objects can be scanned with a simple click, which is convenient for daily system security maintenance.
◇ Isolation system: independently manage unchecked Trojans/spies/worms/advertisements/malware;
◇ Planning tasks: according to the actual needs, arrange different routine scans according to the timetable and scan them regularly;
history
a)。 Scanning record
b)。 Trojan horse/spy/worm/advertisement/malware record
c)。 monitoring record
◇ Enhanced tools:
a)。 Behavior analysis: analyze whether the specified program contains special functions, such as registry modification, network access, and underlying dangerous function call.
B) Report the danger: When your Windows system encounters a suspected Trojan horse/spy/worm/advertisement/malware and other threats, you can upload the suspected files to help us analyze the unknown threats, and then provide you with data updates to eliminate the threats.
Kill a horse
1. Improvement: heuristic scanning to increase the recognition of various shells;
2. Upgrade: add a large number of new threat kills (5000+);
360 Security Guard V4.0.3. 1003 Standard Edition | can kill malware.
Software introduction:
The official version of 360 Security Guard Spring Festival Edition 4.0 is only about 4M, which is suitable for quick installation. (When using Kaspersky antivirus function, you need to manually download Kaspersky antivirus software. )
360 Security Guard is a completely free security online auxiliary tool software launched by Qihoo Company. It has several powerful functions, such as killing popular Trojans, cleaning up bad reviews and system plug-ins, managing application software, Kaspersky antivirus, real-time system protection, and repairing system vulnerabilities. At the same time, it also provides specific auxiliary functions such as comprehensive diagnosis of the system, plug-in immunization, cleaning up traces of use, system recovery, etc., providing a comprehensive diagnosis report for the system, facilitating users to locate problems in time, and truly providing all-round system security for every user.
1, powerful web page leakage prevention, third-party software vulnerability detection, completely cut off Trojan horse communication channels.
Early warning of third-party software vulnerabilities, from the source to curb the intrusion of popular Trojans such as robot dogs into the system.
Super page is leak-proof, which effectively prevents Trojan from invading through IE and protects system security.
2, the installation must be completed with one click, a brand-new safe and fast download platform.
Software installation does not need to go to the download station, and 360 has launched a brand-new "no plug-in, no virus" software download platform.
Complete the whole process of download, installation and management with one click.
3, Trojan horse killing machine integrates dual engines exclusively, and the killing effect is doubled.
Combining the two mechanisms of traditional Trojan feature database accurate matching and active intelligent feature detection, the hidden Trojans in the system are comprehensively detected.
Update Trojan feature database efficiently every day, and track and kill stubborn Trojans such as robot dogs and Trojans.
4. Add patches to fix OFFICE vulnerabilities, fully support patch export and distribution, and be suitable for centralized management of network management.
Comprehensively detect system vulnerabilities and office vulnerabilities, and accurately provide patches needed by the system.
Comprehensive management of installed patches, support for bulk import/export of vulnerability patch source programs, is a good helper for network management to distribute patches centrally.
5.ARP firewall v2.0 is comparable to similar charging software, and LAN attacks have since disappeared.
Including all the functions of other similar charging software: two-way interception of ARP attacks, interception of IP conflicts and other classic ARP interception functions.
More users can customize the settings, which is convenient for Internet cafe users to enjoy protection without being disturbed.
6. Fully optimize the startup speed of 360 security guards, and increase the speed by 1.5 times.
Fully optimize the startup speed of 360 security guards and detect the basic security status of the system faster.
Add more detection settings: automatic detection is convenient and fast, and manual detection is not disturbed.
7. Using exclusive popular library technology, the volume is greatly reduced by 70%, and the installation package is only about 4M.
Simplify the size and download the 4M compressed package quickly, which is more worry-free.
8. Enhance the upgrade module, support multiple upgrades every day, and kill the latest Trojan in the first time.
Before the upgrade module is fully increased, the feature library will be updated faster, and the latest Trojan horse will be killed at the first time.
Rising Kaka Internet Security Assistant V5.0.0.20 | Advertising Intelligent Interception/Plug-in Management Immunity
Software introduction:
Rising Kaka Internet Security Assistant 5.0 is a completely free all-round security tool platform, which integrates powerful functions such as killing popular Trojans, clearing rogue software, scanning system vulnerabilities, online diagnosis, anti-Rootkit, system optimization and acceleration, and super system protection, and provides dozens of practical functions. In addition, Rising Kaka 5.0 adds a "one-click" function, which can remove Trojans, malicious and rogue software from the system and fix system vulnerabilities with only one operation.
New features:
One button
Only one key is needed to quickly remove Trojans, malicious and rogue software from the system and fix operating system vulnerabilities.
Killing and killing popular Trojans
Quickly detect and remove viruses in the system, and fully protect your personal information such as QQ, online games and online banking accounts.
Online diagnosis
Manually or automatically scan key system items on your computer and report suspicious files. Rising website will automatically feed back the scanning results to help you remove the known Trojan virus.
online query
Connect with Rising official server, and inquire whether the programs, active processes or modules connected to the network are safe programs in real time. Check other netizens' comments on this document or express their own opinions.
Product features:
Safety protection platform
Comprehensive integration of system key position protection, U disk virus immunity, IE leak-proof wall, malicious website interception and other security protection functions, so as to achieve unified management and linkage protection, effectively ensuring system security.
System optimization and acceleration
Help clean up junk files, defragment disks, save hard disk space, and improve system running speed and execution efficiency.
Intelligent advertisement blocking ("Bad website access protection function" needs to be enabled)
Intelligently intercept Flash, pop-ups and floating advertisements, and build a quiet and relaxed online environment.
Anti-rogue software technology
Relying on Rising's professional anti-virus technology and applying anti-virus core functions such as anti-Rootkits and start scanning, stubborn rogue software with self-protection and self-hiding can be easily removed.
Network help channel
Help users scan system logs and publish help information through software, waiting for experts' help. At the same time, you can manage your own help posts to get help quickly.
Privacy protection and document shredding
Clean up online traces and system operation records with one click to prevent your privacy from leaking out. At the same time, it provides file shredding function to completely destroy confidential documents.
Advanced user operating platform
It integrates many advanced functions, which is convenient for advanced users to operate and use, and at the same time avoids the risk of primary users.
Jinshan cleaning expert V2.3 New Year Edition | File and IE plug-in cleaning (my favorite)
Software introduction:
1. Check the computer health index.
A. Health indicators: check and evaluate the health status of the system;
B. whether there are security risks in online analysis system plug-ins;
C recommend a simple, safe and effective system cleaning scheme (cleaning up junk files and browser plug-ins).
2. Kill malware
A. Thoroughly kill more than 300 malware, adware and malware killing engines enhanced by hidden software, and thoroughly remove malware protected and disguised by Rootkits technology by using "file shredder" and anti-Rootkits technology;
B. Check and uninstall more than 200 IE plug-ins and system plug-ins;
C. Remove the mixed installation of all kinds of malicious software and plug-ins at one time, and quickly restore the system without repeated operations;
D. Create original plug-in trust list management to avoid deleting beneficial plug-ins you like by mistake.
3. Bug patching
A. Integrate Kingsoft Vulnerability Repair 2007 to quickly fix vulnerabilities in operating systems and applications and reduce security risks;
B. Check loopholes in * * * to avoid accidental disclosure of private documents.
4. System repair
A. Completely repair IE plug-ins and extended functions, reduce the burden on the browser, and let you get a better online experience;
B. adjust the system startup project to speed up the computer startup process;
C. Fully diagnose your system, automatically analyze unknown plug-ins online, and export a diagnosis report for professional analysis.
5. Safe treasure chest
A file shredder, completely delete stubborn malicious programs. After the confidential documents are completely shredded, no tools can be recovered;
B.LSP repair tools to repair the problem that malicious software cannot access the Internet;
C. Process manager, detailed task manager and right-hand man for maintaining the system;
D. Clean up historical traces to prevent historical records from revealing privacy;
E. Clean up junk files, improve system performance, and recycle wasted disk space;
1. Celebrate Christmas with a new look.
Cleaning experts spend Christmas with respected users!
2. Malware library upgrade
3. Launch a new version of the historical trace cleaning tool.
(1) More than 40 cleaning contents in 7 categories.
It can clean up nearly 50 historical traces in 7 categories, covering surfing the Internet, using Windows, playing audio and video, downloading software, Jinshan WPS office software, MS office software and so on.
(2) Selection of various cleaning modes
Built-in cleaning modes such as "default cleaning", "comprehensive cleaning", "surfing the Internet", "audio-visual enthusiast", "network download enthusiast" and "user-defined cleaning items" are convenient for different users to quickly select cleaning contents according to their own needs.
4. Interface interaction optimization
5. Improve some problems that have been found.
That's enough.